Логотип exploitDog
bind:CVE-2020-8861
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-8861

Количество 3

Количество 3

nvd логотип

CVE-2020-8861

почти 6 лет назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9554.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-c85x-hq3f-wfrq

больше 3 лет назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9554.

EPSS: Низкий
fstec логотип

BDU:2020-01124

около 6 лет назад

Уязвимость реализации HNAP микропрограммного обеспечения беспроводных маршрутизаторов D-Link DAP-1330, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-8861

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9554.

CVSS3: 8.8
3%
Низкий
почти 6 лет назад
github логотип
GHSA-c85x-hq3f-wfrq

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9554.

3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01124

Уязвимость реализации HNAP микропрограммного обеспечения беспроводных маршрутизаторов D-Link DAP-1330, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
3%
Низкий
около 6 лет назад

Уязвимостей на страницу